CVE-2004-1075

Zwiki - XSS

Title source: rule
STIX 2.1

Description

Cross-site scripting (XSS) vulnerability in standard_error_message.dtml for Zwiki after 0.10.0rc1 to 0.36.2 allows remote attackers to inject arbitrary HTML and web script via a malformed URL, which is not properly cleansed when generating an error message.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Jeremy Bae · textwebappsphp
https://www.exploit-db.com/exploits/24772

References (6)

Core 6
Core References
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/11745
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=110138568212036&w=2
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=110149122529761&w=2
Various Sources x_refsource_confirm
http://zwiki.org/925ZwikiXSSVulnerability
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/18237
Third Party Advisory vendor-advisory x_refsource_gentoo
http://www.gentoo.org/security/en/glsa/glsa-200412-23.xml

Scores

EPSS 0.0834
EPSS Percentile 92.3%

Details

Status published
Products (2)
zwiki/zwiki 0.10_rc1
zwiki/zwiki 0.36.2
Published Jan 10, 2005
Tracked Since Feb 18, 2026